The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a segmentation method based on normalized cut and superpixels. The method relies on color and texture cues for fast computation and efficient use of memory. The method is used for food image segmentation as part of a mobile food record system we have developed for dietary assessment and management. The accurate estimate of nutrients relies on correctly labelled food items...
We focus on feature extraction and selection to best represent texture and shape properties of plant diseases in an image-based leaf monitoring system implemented in a mobile-cloud environment. A number of textural and region-based features are aggregated from previous studies; also we introduce mean and peak indices of histogram-of-shape as disease property representations along with the proposed...
As the competition in mobile markets becomes fiercer, telecom operators have devoted themselves to serving subscribers better. Among large number of subscribers, there are some anomalous users who should be paid more attention to, such as those issuing a lot of unsolicited calls to normal subscribers or making calls to one single phone number continuously. Our study is based on the data of Call Detail...
Mobile Adhoc Network (MANET) is extremely susceptible to more attacks owing to its characteristics such as mobility and dynamic topology changes. In particular, routing process in MANET is aimed by more adversaries for various attacks to ruin the data transmission. In this paper, we introduce a combined technique for attack monitoring and risk assessment in MANET routing. The proposed solution chooses...
As the popularity of mobile video streaming services has been increasing rapidly, mobile network operators are faced with big challenges how to guarantee the quality of video streaming services especially in the wireless mobile network. In this paper, we were focused on the real-time live streaming services in LTE network which has fluctuated radio environment that requires special treatments for...
Based on multiple practical progresses in the development and implementation of Dr. What-Info prototype system, this paper continues probing into the expanded system Dr. What-Info II, the UAI technology for different data formats is analyzed, designed and researched with WIAS support, so as to explore how to intercept the construction of network service system APIs of suitable corresponding information...
Nowadays, mobile phones have prevailed in a great variety of applications, through which massive personal trajectories can be collected and analyzed to support many interesting location-based services. However, it is still challenging to efficiently store and retrieve this kind of spatio-temporal data, which has typical big-data feature with large size, streaming style and multiple data source. To...
Recently, a number of offloading approaches have been proposed to reduce the burden on the cellular infrastructure, especially during peak hours. Ranging from pure data offloading concepts using local caches to fully-fledged services operating on ad hoc networks, these approaches are mostly tuned towards their performance. Consequently, cache hit ratios, achieved throughput, or end-to-end latencies,...
Due to recent developments in sensor technologies, mobile sensor device use has become widespread, and many researchers have been attempting to leverage data collected by these devices. We call such data 'mobile sensor data'. Mobile sensor data are geo-referenced data with environmental attribute values, and they enable us to determine the geographical distribution of hot spots by retrieving data...
Social Networks (SNs) have gained a lot of popularity on the Internet and become a hot research topic attracting many professionals from diverse areas. Recently, Location-based Social Networks (LBSNs) have attracted millions of users, experiencing a huge popularity increase over a short period of time. In Location-based social network, users can easily set their locations as a new interactive way...
Ensuring fair co-existence between unlicensed LTE and WiFi networks is currently of major concern to both cellular operators and WiFi providers. Two main unlicensed LTE approaches currently being discussed, namely Carrier Sense Adaptive Transmission (CSAT) and Listen Before Talk (LBT). While these mechanisms differ in their compatibility with existing LTE specifications and regulatory compliance in...
We have proposed a prioritized random access (PRA) scheme, where each node indicates its access priority by differentiating the transmit power of preamble signatures and the eNodeB utilizes multiple detection thresholds to detect the prioritized preamble signatures. In this paper, in order to make the PRA scheme more robust, we enhance our previously proposed PRA scheme by investigating the effect...
Edge cloud is a promising architecture in order to address the latency problem in mobile cloud computing. However, as compared with remote clouds, edge clouds have limited computational resources, and higher operating costs. In this paper, we design policies which carry out the assignment of tasks that are generated at the mobile subscribers with edge clouds in an online fashion. The proposed policies...
One of the main challenges for continued wireless capacity growth is the difficulty in exploiting the multicast nature of the wireless medium: wireless end points rarely experience the same channel conditions or access the same content at the same time. In this paper, we present and analyze a novel wireless video delivery paradigm based on the combined use of channel-aware caching and coded multicasting...
This paper investigates the coordinated multipoint transmission (CoMP) in heterogeneous cellular networks (HCNs) by analyzing a cooperative scheme based on the maximum long-term average received power (MLRP). Using stochastic geometry, the outage probability (OP) and energy efficiency (EE) of a two-tier HCN operating under this scheme are derived, based on which the trade-off between OP and EE is...
In this paper, a novel coordinated initial access (IA) scheme for clustered millimeter wave small cells (mmSCs) is proposed for the fifth generation mobile communication networks (5G). This solution is a method for efficient and fast initial access for ultra-dense millimeter wave standalone networks without presence of overlaid legacy networks operating on lower frequency. In contrast to the current...
Safety is naturally location dependent, it is also inherently volatile. It not only exhibits temporal patterns but also depends on the current context. Furthermore public safety has a personal dimension. Users of different backgrounds are likely to be impacted differently by the same location and time context. In this paper we investigate the combination of location and time indexed crime datasets,...
The emergence of new communication technologiesand the latest generation of smart-phone devices, allow the userto continuously access the Web, at any time and from any locationwith different devices. The introduction of the user and hisenvironment in the research process is intended to solve theinformation overload problem and to increase the accuracy ofthe retrieval system. In this paper, we present...
Mobile web browsing has inherent usability and content discovery problems that warrants alternate browsing paradigms. To provision improved web usability, a server hosted multi-topic content indexing system and a client-based topic cluster solution has been developed that allows the user to browse the web based on content semantics alone. Semantic connections between content are established based...
Mobility pattern of an adhoc network affects its connectivity. Random Waypoint Mobility Model is widely followed by Mobile Adhoc Networks (MANET) in real world scenario. This mobility model is popular because it represents random motion of nodes which can move in any direction at any moment at a random speed. In this paper, the connectivity of a MANET, following Random Waypoint Mobility Model has...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.